咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 5 篇 elliptic curve c...
  • 1 篇 man in the middl...
  • 1 篇 cyberattack
  • 1 篇 double-way authe...
  • 1 篇 digital arithmet...
  • 1 篇 multiplication
  • 1 篇 load decompositi...
  • 1 篇 diffie-helman ke...
  • 1 篇 algorithms
  • 1 篇 multiple-word ra...
  • 1 篇 arithmetic opera...
  • 1 篇 internet of thin...
  • 1 篇 digit recoding
  • 1 篇 confidential doc...
  • 1 篇 supply chain man...
  • 1 篇 encryption algor...
  • 1 篇 multipr
  • 1 篇 modular multipli...
  • 1 篇 information secu...
  • 1 篇 multiplying circ...

机构

  • 1 篇 computer basic t...
  • 1 篇 jordan universit...
  • 1 篇 weifang univ wei...
  • 1 篇 fujian univ tech...
  • 1 篇 fujian univ tech...
  • 1 篇 xiamen inst tech...
  • 1 篇 saudi elect univ...
  • 1 篇 fujian univ tech...
  • 1 篇 school of electr...

作者

  • 1 篇 yongjin ren
  • 1 篇 jie deng
  • 1 篇 peng kang-ning
  • 1 篇 koc cetin kaya
  • 1 篇 zhang wen-feng
  • 1 篇 alnasser sulaima...
  • 1 篇 yan renwu
  • 1 篇 yang xiaopeng
  • 1 篇 linghu mengmeng
  • 1 篇 chen li-wen
  • 1 篇 lin chuan
  • 1 篇 alsaqour raed
  • 1 篇 tenca alexandre ...
  • 1 篇 yunji li
  • 1 篇 tawalbeh lo'ai a...

语言

  • 5 篇 英文
检索条件"主题词=Elliptic Curve Cryptography Algorithm"
5 条 记 录,以下是1-10 订阅
排序:
A radix-4 scalable design
收藏 引用
IEEE Potentials 2005年 第2期24卷 16-18页
作者: Tawalbeh, Lo'ai A. Tenca, Alexandre F. Koc, Cetin Kaya Jordan University of Science and Technology Jordan School of Electrical Engineering and Computer Science Oregon State University United States
No abstract available
来源: 评论
An IFF Identity Authentication Scheme of Security and Guarantee System  17
An IFF Identity Authentication Scheme of Security and Guaran...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Jie Deng Yongjin Ren Yunji Li Computer Basic Teaching and Research Section Officer's College of CAPF
In view of technology backward of the friend or foe identification and having not a subtle and effective internal communication mechanism in the current security system on duty, which leads to a serious security threa... 详细信息
来源: 评论
Research on information security of users' electricity data including electric vehicle based on elliptic curve encryption
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2020年 第11期16卷
作者: Yan, Renwu Lin, Chuan Zhang, Wen-feng Chen, Li-wen Peng, Kang-ning Fujian Univ Technol Fujian Key Lab Automot Elect & Elect Drive Techno Fujian Coll & Univ Engn Res Ctr Smart Grid Simula Coll Informat Sci & Engn Fuzhou 350118 Peoples R China Fujian Univ Technol Fujian Coll & Univ Engn Res Ctr Smart Grid Simula Coll Informat Sci & Engn Fuzhou Peoples R China Fujian Univ Technol Coll Informat Sci & Engn Fuzhou Peoples R China
In the smart grid and big data environment, accurate and large amount of power load data for users can be obtained with the wide application of non-intrusive load monitoring technology. In the research process of cust... 详细信息
来源: 评论
Supply Chain System Optimization Model for Logistics Enterprises in the Internet of Things Era Based on Improved ECC algorithm
收藏 引用
ENGINEERING MANAGEMENT JOURNAL 2024年
作者: Yang, Xiaopeng Linghu, Mengmeng WeiFang Univ Weifang Peoples R China Xiamen Inst Technol Xiamen 361021 Fujian Peoples R China
In this article, a new method to optimize the supply chain system (SCS) of logistics companies in the era of Internet of Things (IoT) using an improved elliptic curve cryptography (ECC) algorithm was put *** focus of ... 详细信息
来源: 评论
Encryption algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第8期13卷 64-76页
作者: Alnasser, Sulaiman Alsaqour, Raed Saudi Elect Univ Coll Comp & Informat Dept Informat Technol Riyadh 93499 Saudi Arabia
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man... 详细信息
来源: 评论